Why are we concerned about data transmission security?
Because security breaches can lead to lost or stolen business data and reduced network performance.
What is eavesdropping?
When someone listens to data being transmitted over a network without permission.
Why is eavesdropping possible on a LAN?
Data is sent to all devices on the LAN, but only the intended device accepts it—malicious users can bypass this.
How do hackers access data not meant for them?
By using tools that stop a computer from ignoring data packets.
What is** packet sniffing?**
The use of software to inspect all data packets travelling across a network.
Who uses packet sniffing legitimately?
To steal passwords, credit card details, and confidential data.
How does packet sniffing software work?
It forces a PC to capture and read all network traffic.
Which networks are most susceptible to packet sniffing?
What is required to use packet sniffing?
Only a connection to the network.
Which networks are least susceptible to packet sniffing?
What is spoofing?
When a computer pretends to be another computer on a network.
How are computers identified on a network?
By a unique IP address.
Why is spoofing dangerous?
It can trick systems into granting access meant for another device.
How does spoofing work?
Hackers use fake credentials or IP addresses to gain unauthorised access.
What attacks can spoofing enable?
How does spoofing cause a DoS attack?
By sending massive amounts of data while pretending to be a legitimate source.
What networks are susceptible to spoofing?
Are VPNs safe from spoofing?
No, VPN connections can also be spoofed.
What is a firewall?
Hardware or software that monitors and blocks unwanted network traffic.
What can a firewall do?
What is a hardware firewall?
A physical device or router that sits between the LAN and the internet.
How does a hardware firewall work?
Uses rules to filter and block unwanted traffic.
What is a software firewall?
A firewall installed on individual devices.
What does a software firewall monitor?
Incoming and outgoing traffic from the computer.